期刊文献+

双正交提升小波和奇异值分解的彩色水印算法研究 被引量:6

Research of color image watermarking algorithm based on biorthogonal lifting wavelet and singular value decomposition
在线阅读 下载PDF
导出
摘要 在现有彩色图像水印提取技术基础上,提出一种结合9/7双正交提升小波和图像矩阵奇异值分解的彩色图像水印加密算法。首先将彩色原始图像和彩色水印图像R、G、B分离,将图像相应分量进行提升小波三级分解得到低频部分,并将该低频信息进行奇异值分解,把水印信息视做扰动矩阵按一定的量加在低频信息的对角阵上,其中彩色水印图像预处理结合了骑士巡游变换和Arnold置乱算法。实验结果表明算法在确保水印不可见性的基础上有效地增强了水印的强度和鲁棒性,实现了水印图像的盲检验。 On the basis of the existing color image watermarking extraction technology, this paper proposed a color image wa- termark encryption algorithm which based on the 9/7 biorthogonal lifting wavelet and singular value decomposition. Firstly, it divided the color original image and color watermarking image intoR, G, B separation. The image components conducted the lifting wavelet transform three level decomposition and get the low frequency part. The watermark algorithm disposed the low frequency information by singular value decomposition and treated watermark information as matrix disturbance adding to diago- nal matrix with a certain content. The pre-treatment of watermark information adopted the algorithm of knight-tour transform and Arnold scrambling. The experimental results show that the algorithm in the basis to ensure the invisibility of watermark effec- tively enhances the strength and the robustness of the watermark. The algorithm realizes blind test.
出处 《计算机应用研究》 CSCD 北大核心 2014年第2期568-570,575,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61174145) 重点大学理论研究基金资助项目(N110404026,N110804005)
关键词 双正交提升小波 矩阵奇异值分解 水印加密 骑士巡游变换 ARNOLD 置乱 鲁棒性 biorthogonal lifting wavelet singular value decomposition watermark encryption knight-tour transform Ar- nold scrambling robustness
  • 相关文献

参考文献6

二级参考文献41

  • 1孙新德,路玲.Arnold变换在数字图像水印中的应用研究[J].信息技术,2006,30(10):129-132. 被引量:18
  • 2邱应强,程义民,王以孝.一种基于矢量量化彩色图像的水印方法[J].中国科学技术大学学报,2007,37(2):135-142. 被引量:2
  • 3董敏,王向阳.基于模糊聚类的小波域数字图像水印算法[J].计算机应用研究,2007,24(6):194-196. 被引量:8
  • 4方孝鹏,彭波.基于小波变换图像鲁棒性水印算法[J].计算机应用,2007,27(B06):276-277. 被引量:2
  • 5COX I J, MILLER M L, BLOOM J A. Digital water-marking [ M ]. San Mateo : Morgan Kaufmann publishers, 2001 : 1 - 576.
  • 6LEE S J, JUNG S H. A survey of watermarking techniques applied to multimedia[ C]//IEEE Intl Symp Industrial Electronics. Pusan Korea: [ s. n. ] , 2001:272 - 277.
  • 7CHEN Liang-hua, LIN Jyh-jiun. Mean quantization based image watermarking [ J ]. Image and Vision Computing, 2003, 21(8): 717-727.
  • 8AHMIDI N, SAFABAKHSH R . A novel DCT- based approach for secure color image watermarking[ C ]//Intl Conf Info Tech Coding and Computing. Tehran Iran : [ s. n. ], 2004:709-713.
  • 9YANG X K, LIN W S, LU Z, et al. Just-noticeable-distortion profile with nonlinear additivity model for perceptual masking in color images [ C ]//IEEE Intl Conf acoustics, Speech, and Signal Process (ICASSP'03 ). Hong Kang: [s. n. ] , 2003:609 -612.
  • 10WATSON A B, YANG G Y, SOLOMON J A. Visibility of wavelet quantization noise [ J ]. IEEE Trans Image Process, 1997, 6(8) :1164 - 1175.

共引文献26

同被引文献69

  • 1CELIK M U, SHARMA G, TEKALP A M. Lossless watermarking for image authentication: a new framework and an implementation [ J ]. IEEE Trans on Image Processing ,2006,15 (4) : 1042-1049.
  • 2TIAN Jun. Reversible data embedding using a difference expansion [J]. IEEE Trans on Circuits and System for Video Technology, 2003,13(8) :890-896.
  • 3NI Zhi-cheng, SHI Yun-qing, NIRWAN A, et al. Reversible data hiding[J]. IEEE Trans on Circuits anti System for Video Tech- nology, 2006,16 ( 3 ) : 354 - 362.
  • 4TAI Wei-liang, YEH C M, CHANG Chin-chen. Reversible data hi- ding based on histogram modification of pixel differences [ J ]. IEEE Trans on Circuits and System for Video Technology, 2009,19 (6) :906-910.
  • 5TSA P, HU Yu-chen, YEH H L. Reversible image hiding scheme using predictive coding and histogram shifting [ J ]. Signal Process- ing,2009,89 ( 6 ) : 1129 - 1143.
  • 6LUO Li-xin, CHEN Zhen-yong, CHEN Ming, et al. Reversible image watermarking using interpolation technique [ J]. IEEE Trans on In- formation Forensics and Security ,2010,5 ( 1 ) : 187-193.
  • 7CANCELLARO M, BATrISTI F, CARLI M, et al. A commutative digital image watermarking and encryption method in the tree struc- tured Haar transform domain[ J]. Signal Processing: Image Com- munication ,2011,26 ( 1 ) : 1 - 12.
  • 8KUNDUR D, KARTHIK K. Video fingerprinting and encryption prin- ciples for digital rights management[ J]. Proceedings of the IEEE, 2004,92 (6) :918-932.
  • 9ZHANG Xin-peng. Reversible data hiding in encrypted images [ J ]. IEEE Signal Processing Letters,2011,18(4) :255-258.
  • 10HONG W, CHEN Tung-shou, WU Han-yan. An improved reversible data hiding in encrypted images using side match[ J]. IEEE Signal Processing Letters ,2012,19 (4) : 199-202.

引证文献6

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部